Recognizing and Predicting Context by Learning from User Behavior

Size: px
Start display at page:

Download "Recognizing and Predicting Context by Learning from User Behavior"

Transcription

1 Recognizing and Predicting Context by Learning from User Behavior 15. September 2003, Jakarta Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria < 1 >

2 Vision A Personal Digital Assistant that can live up to its name. < 2 >

3 Mission Problem: Most information appliances are difficult to use for non-technology-savy users Devices only react to user input Users have to adapt to the devices Aim: Make information appliances smarter in a sense that they are easier to use Devices should be proactive Devices should adapt to the user < 3 >

4 Approach Personal information appliances should learn from user s habits Exploiting multiple sensors for context awareness Predicting future user context by learning from the past information appliance sensors (low level data) current user context user habits high level context information application future user context < 4 >

5 Content Introduction Context awareness Proactivity Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 5 >

6 Context awareness Many definitions for context, e.g. by Dey as any information that can be used to characterize the situation of an entity, where an entity can be a person, place or a physical or computational object Context has many aspects Using multiple simple sensors seems more reasonable to capture different aspects of context < 6 >

7 Proactivity < 7 >

8 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 8 >

9 Architecture S 1 Feature extraction Classification Labeling Meeting n t Sensors S 2 S 3 C 1 C 2 At desk m t+ C m C k / P k S l Prediction <s 1, s 2,..., s l > t <f 1, f 2,..., f n > t <c 1, c 2,..., c m > t <c 1, c 2,..., c m > t+ Input vector (Sensor vector) Feature vector Class vector Future class vector < 9 >

10 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 10 >

11 Sensors for (mobile) information appliances Typical sensors available for monitoring the user context: Time Application/Window manager Brightness Microphone Bluetooth Wireless LAN Docked / undocked Other suitable sensors can be connected: GPS GSM Compass Accelerometer Tilt sensor Temperature sensor Pressure sensor Sharing of sensor data between appliances < 11 >

12 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction < 12 >

13 Feature Extraction Raw sensor data is transformed into more meaningful features Feature extraction exploits domain-specific knowledge Multiple features extracted from a single sensor High-dimensional input vectors Different types of features: Numerical (continuous) sensors: e.g. brightness sensor Numerical (discrete) sensors: e.g. number of access points in range Ordinal sensors: e.g. day of week Nominal sensors: e.g. WLAN-SSID, list of Bluetooth devices in spatial proximity Only two operations necessary for each feature: Distance metric Adaptation operator < 13 >

14 Feature extraction on a current PDA With current computational power easily possible Every feature implements distance metric and adaptation operator On-line classifications possible with any combination of features (user-selectable and loaded dynamically during startup) < 15 >

15 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 16 >

16 Classification: Introduction Classifies feature vectors and finds common patterns in sensor data Different types of classification algorithms Type (partitioning / hierarchical) Soft / hard classification Supervised / unsupervised Requirements for classifying user context in information appliances: On-line learning Adaptivity Variable number of classes and variable topology Soft classification Noise resistance Limited resources Simplicity Interpretability of classes / protection of data privacy < 17 >

17 Classification: Algorithms Algorithm Network topology Topology preserving Competitive SOM fixed yes soft RSOM fixed yes soft K-Means fixed no hard Leader variable no hard Growing K-Means variable no hard Neural Gas variable no soft Neural Gas + Competitive Hebbian Learning variable yes soft Growing Neural Gas variable yes soft Incremental DBSCAN variable No hard < 18 >

18 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 20 >

19 Assigning user-defined labels to user context t t t 1:{0,1} assignment of (meta-) clusters to context names Two possibilities: If the (meta-) clusters at the output of the classification step are stable, direct assignment to names If the (meta-) clusters are unstable due to learning and adaptation, use a second, simple classification step [van Laerhoven, 2001] ID 1 = at work ID 2 = meeting ID 3 = lunch ID 4 = ID 5 = at home < 21 >

20 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 22 >

21 Prediction of User Context Recognized context classes can be regarded as states of an abstract state machine Monitoring the state trajectory allows to predict future states Prediction algorithm requirements for predicting context states : Unsupervised model estimation On-line learning Incremental model growing Confidence estimation Automatic feedback Manual feedback Long-term vs. short-term Architecture allows prediction algorithms to be realized as plug-ins Algorithms can be changed according to the specific application needs < 23 >

22 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 24 >

23 First Results Test data gathered over 10 days for a selection of features: Timestamp Bluetooth: list of MAC addresses in spatial proximity Bluetooth: number of peers in spatial proximity Wireless LAN: list of MAC addresses in spatial proximity (clients associated to a nearby access point) Currently active application Distance metrics and adaptation operators implemented in straight-forward ways (e.g. Hamming distance for lists of MAC addresses) Implementation of Lifelong Growing Neural Gas (LLGNG) as classification algorithm < 25 >

24 First Results One-pass (online) run through the log file yields (multiple test runs): ~ 40 clusters ~ 6 meta-clusters < 0.12 overall classification error (average distance of input data points to cluster centers) < 26 >

25 Summary Architecture allows recognition and prediction of user context from raw sensor data in an un-supervised, non-obtrusive way in 4 steps: Feature extraction Classification Labeling Prediction Simple interfaces between the architecture layers Multiple, simple sensors instead of a single, complex one Heterogeneous feature vector handled via specific implementation of: distance metric adaptation operator for each feature First implementations of feature extraction and classification show promising results < 27 >

26 Conclusions and Future Outlook Proactive applications could allow the development of more intuitive user interfaces A Personal Digital Assistant and information appliances in general should become proactive to achieve a wider acceptance Context awareness is one possibility to achieve proactivity in applications Learning user behavior allows to predict future user context and thus future user actions Future research on non-obtrusive user interfaces for labeling user context necessary Qualitative comparison of prediction methods will be performed using realworld data < 28 >

27 It is hard to predict, especially the future Neils Bohr Winner of a Nobel Prize for physics < 29 >

28 The best way to predict the future is to invent it. Alan Kay Inventor of Smalltalk < 30 >

29 Thank you for your attention! < 31 >

Feature Extraction in Wireless Personal and Local Area Networks

Feature Extraction in Wireless Personal and Local Area Networks Feature Extraction in Wireless Personal and Local Area Networks 29. October 2003, Singapore Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 > Content

More information

Context prediction based on learning user habits: A next step towards "smart" systems

Context prediction based on learning user habits: A next step towards smart systems Context prediction based on learning user habits: A next step towards "smart" systems 31. January 2006, Helsinki Guest lecture 1 Computing Department Lancaster University, UK rene@comp.lancs.ac.uk < 1

More information

Extending the Growing Neural Gas Classifier for Context Recognition

Extending the Growing Neural Gas Classifier for Context Recognition Extending the Classifier for Context Recognition Eurocast 2007, Workshop on Heuristic Problem Solving, Paper #9.24 14. February 2007, 10:30 Rene Mayrhofer Lancaster University, UK Johannes Kepler University

More information

Extending the Growing Neural Gas Classifier for Context Recognition

Extending the Growing Neural Gas Classifier for Context Recognition Extending the Growing Neural Gas Classifier for Context Recognition Rene Mayrhofer 1 and Harald Radi 2 1 Lancaster University, Infolab21, South Drive, Lancaster, LA1 4WA, UK rene@comp.lancs.ac.uk 2 Tumpenweg

More information

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input. MOBILE COMPUTING CSE 40814/60814 Spring 2017 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input. MOBILE COMPUTING CSE 40814/60814 Spring 2018 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

GENERATING HIGH LEVEL CONTEXT FROM SENSOR DATA FOR MOBILE APPLICATIONS

GENERATING HIGH LEVEL CONTEXT FROM SENSOR DATA FOR MOBILE APPLICATIONS GENERATING HIGH LEVEL CONTEXT FROM SENSOR DATA FOR MOBILE APPLICATIONS Wolfgang Woerndl 1, Christian Schueller 2, Thomas Rottach 1,2 1 Technische Universitaet Muenchen, Institut fuer Informatik Boltzmannstr.

More information

Machine Learning (CSMML16) (Autumn term, ) Xia Hong

Machine Learning (CSMML16) (Autumn term, ) Xia Hong Machine Learning (CSMML16) (Autumn term, 28-29) Xia Hong 1 Useful books: 1. C. M. Bishop: Pattern Recognition and Machine Learning (2007) Springer. 2. S. Haykin: Neural Networks (1999) Prentice Hall. 3.

More information

Cluster Analysis. Mu-Chun Su. Department of Computer Science and Information Engineering National Central University 2003/3/11 1

Cluster Analysis. Mu-Chun Su. Department of Computer Science and Information Engineering National Central University 2003/3/11 1 Cluster Analysis Mu-Chun Su Department of Computer Science and Information Engineering National Central University 2003/3/11 1 Introduction Cluster analysis is the formal study of algorithms and methods

More information

Exploratory Data Analysis using Self-Organizing Maps. Madhumanti Ray

Exploratory Data Analysis using Self-Organizing Maps. Madhumanti Ray Exploratory Data Analysis using Self-Organizing Maps Madhumanti Ray Content Introduction Data Analysis methods Self-Organizing Maps Conclusion Visualization of high-dimensional data items Exploratory data

More information

Context-Aware Systems. Michael Maynord Feb. 24, 2014

Context-Aware Systems. Michael Maynord Feb. 24, 2014 Context-Aware Systems Michael Maynord Feb. 24, 2014 The precise definition of 'context' is contentious. Here we will be using 'context' as any information that can be used to characterize the situation

More information

Data mining fundamentals

Data mining fundamentals Data mining fundamentals Elena Baralis Politecnico di Torino Data analysis Most companies own huge bases containing operational textual documents experiment results These bases are a potential source of

More information

9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input

9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input MOBILE COMPUTING CSE 40814/60814 Fall 2015 System Structure explicit input explicit output 1 Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

A SURVEY OF IMAGE MINING TECHNIQUES AND APPLICATIONS

A SURVEY OF IMAGE MINING TECHNIQUES AND APPLICATIONS A SURVEY OF IMAGE MINING TECHNIQUES AND APPLICATIONS R. Vijayalatha Research Scholar, Manonmaniam Sundaranar University, Tirunelveli (India) ABSTRACT In the area of Data Mining, Image Mining technology

More information

Random Forest A. Fornaser

Random Forest A. Fornaser Random Forest A. Fornaser alberto.fornaser@unitn.it Sources Lecture 15: decision trees, information theory and random forests, Dr. Richard E. Turner Trees and Random Forests, Adele Cutler, Utah State University

More information

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

D B M G Data Base and Data Mining Group of Politecnico di Torino

D B M G Data Base and Data Mining Group of Politecnico di Torino DataBase and Data Mining Group of Data mining fundamentals Data Base and Data Mining Group of Data analysis Most companies own huge databases containing operational data textual documents experiment results

More information

Homework # 4. Example: Age in years. Answer: Discrete, quantitative, ratio. a) Year that an event happened, e.g., 1917, 1950, 2000.

Homework # 4. Example: Age in years. Answer: Discrete, quantitative, ratio. a) Year that an event happened, e.g., 1917, 1950, 2000. Homework # 4 1. Attribute Types Classify the following attributes as binary, discrete, or continuous. Further classify the attributes as qualitative (nominal or ordinal) or quantitative (interval or ratio).

More information

Machine Learning : Clustering, Self-Organizing Maps

Machine Learning : Clustering, Self-Organizing Maps Machine Learning Clustering, Self-Organizing Maps 12/12/2013 Machine Learning : Clustering, Self-Organizing Maps Clustering The task: partition a set of objects into meaningful subsets (clusters). The

More information

Cooperative Communications and Wireless Body Area Networks. Xigang Huang

Cooperative Communications and Wireless Body Area Networks. Xigang Huang Cooperative Communications and Wireless Body Area Networks Xigang Huang Contents Wireless Body Area Networks Applications Network architecture of WBANs MAC and Route Protocols Interworking Cooperative

More information

Slide07 Haykin Chapter 9: Self-Organizing Maps

Slide07 Haykin Chapter 9: Self-Organizing Maps Slide07 Haykin Chapter 9: Self-Organizing Maps CPSC 636-600 Instructor: Yoonsuck Choe Spring 2012 Introduction Self-organizing maps (SOM) is based on competitive learning, where output neurons compete

More information

INTRODUCTION TO DATA MINING

INTRODUCTION TO DATA MINING INTRODUCTION TO DATA MINING 1 Chiara Renso KDDLab - ISTI CNR, Italy http://www-kdd.isti.cnr.it email: chiara.renso@isti.cnr.it Knowledge Discovery and Data Mining Laboratory, ISTI National Research Council,

More information

Music Similarity Clustering

Music Similarity Clustering Cognitive Science B.Sc. Program University of Osnabrück, Germany Music Similarity Clustering A Content-Based Approach in Clustering Music Files According to User Preference Thesis-Project for the Degree

More information

A Survey of Context-Aware Mobile Computing Research

A Survey of Context-Aware Mobile Computing Research A Survey of Context-Aware Mobile Computing Research Guanling Chen and David Kotz 2005.11. 14 Cho Jaekyu jkcho@mmlab.snu.ac.kr Contents 1 2 3 4 5 6 7 8 Introduction Definition of Context Context-Aware Computing

More information

Input: Concepts, Instances, Attributes

Input: Concepts, Instances, Attributes Input: Concepts, Instances, Attributes 1 Terminology Components of the input: Concepts: kinds of things that can be learned aim: intelligible and operational concept description Instances: the individual,

More information

CHAPTER 4: CLUSTER ANALYSIS

CHAPTER 4: CLUSTER ANALYSIS CHAPTER 4: CLUSTER ANALYSIS WHAT IS CLUSTER ANALYSIS? A cluster is a collection of data-objects similar to one another within the same group & dissimilar to the objects in other groups. Cluster analysis

More information

DI TRANSFORM. The regressive analyses. identify relationships

DI TRANSFORM. The regressive analyses. identify relationships July 2, 2015 DI TRANSFORM MVstats TM Algorithm Overview Summary The DI Transform Multivariate Statistics (MVstats TM ) package includes five algorithm options that operate on most types of geologic, geophysical,

More information

2. Basic Task of Pattern Classification

2. Basic Task of Pattern Classification 2. Basic Task of Pattern Classification Definition of the Task Informal Definition: Telling things apart 3 Definition: http://www.webopedia.com/term/p/pattern_recognition.html pattern recognition Last

More information

Chapter DM:II. II. Cluster Analysis

Chapter DM:II. II. Cluster Analysis Chapter DM:II II. Cluster Analysis Cluster Analysis Basics Hierarchical Cluster Analysis Iterative Cluster Analysis Density-Based Cluster Analysis Cluster Evaluation Constrained Cluster Analysis DM:II-1

More information

Chapter 7: Competitive learning, clustering, and self-organizing maps

Chapter 7: Competitive learning, clustering, and self-organizing maps Chapter 7: Competitive learning, clustering, and self-organizing maps António R. C. Paiva EEL 6814 Spring 2008 Outline Competitive learning Clustering Self-Organizing Maps What is competition in neural

More information

CogniSight, image recognition engine

CogniSight, image recognition engine CogniSight, image recognition engine Making sense of video and images Generating insights, meta data and decision Applications 2 Inspect, Sort Identify, Track Detect, Count Search, Tag Match, Compare Find,

More information

Data Sources for Cyber Security Research

Data Sources for Cyber Security Research Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,

More information

Context Aware Computing

Context Aware Computing CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware

More information

CS513-Data Mining. Lecture 2: Understanding the Data. Waheed Noor

CS513-Data Mining. Lecture 2: Understanding the Data. Waheed Noor CS513-Data Mining Lecture 2: Understanding the Data Waheed Noor Computer Science and Information Technology, University of Balochistan, Quetta, Pakistan Waheed Noor (CS&IT, UoB, Quetta) CS513-Data Mining

More information

Unsupervised Learning

Unsupervised Learning Networks for Pattern Recognition, 2014 Networks for Single Linkage K-Means Soft DBSCAN PCA Networks for Kohonen Maps Linear Vector Quantization Networks for Problems/Approaches in Machine Learning Supervised

More information

Overview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home!

Overview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home! Overview Background Intelligence at the Edge Samsung Research Learning at the Edge: Challenges and Brainstorming Amazon Alexa Smart Home! Background Ph.D. at UW CSE RFID, Mobile, Sensors, Data Nokia Research

More information

Applied Statistics for Neuroscientists Part IIa: Machine Learning

Applied Statistics for Neuroscientists Part IIa: Machine Learning Applied Statistics for Neuroscientists Part IIa: Machine Learning Dr. Seyed-Ahmad Ahmadi 04.04.2017 16.11.2017 Outline Machine Learning Difference between statistics and machine learning Modeling the problem

More information

Star rating driver safety behavior by the use of smart technologies

Star rating driver safety behavior by the use of smart technologies RoundTable Use of technology and its impact on road safety New York, June 14, 2016 Star rating driver safety behavior by the use of smart technologies George Yannis, Professor National Technical University

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

PARALLEL CLASSIFICATION ALGORITHMS

PARALLEL CLASSIFICATION ALGORITHMS PARALLEL CLASSIFICATION ALGORITHMS By: Faiz Quraishi Riti Sharma 9 th May, 2013 OVERVIEW Introduction Types of Classification Linear Classification Support Vector Machines Parallel SVM Approach Decision

More information

COMP90049 Knowledge Technologies

COMP90049 Knowledge Technologies COMP90049 Knowledge Technologies Data Mining (Lecture Set 3) 2017 Rao Kotagiri Department of Computing and Information Systems The Melbourne School of Engineering Some of slides are derived from Prof Vipin

More information

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework Department of Computer Science & Engineering University of Kalyani Syllabus for Ph.D. Coursework Paper 1: A) Literature Review: (Marks - 25) B) Research Methodology: (Marks - 25) Paper 2: Computer Applications:

More information

Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review

Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review S. M. Jawahire Dept. of Computer Engineering J.S.C.O.E.,Hadapsar Pune, India H. A. Hingoliwala Dept. of Computer Engineering

More information

Public Sensing Using Your Mobile Phone for Crowd Sourcing

Public Sensing Using Your Mobile Phone for Crowd Sourcing Institute of Parallel and Distributed Systems () Universitätsstraße 38 D-70569 Stuttgart Public Sensing Using Your Mobile Phone for Crowd Sourcing 55th Photogrammetric Week September 10, 2015 Stuttgart,

More information

Object perception by primates

Object perception by primates Object perception by primates How does the visual system put together the fragments to form meaningful objects? The Gestalt approach The whole differs from the sum of its parts and is a result of perceptual

More information

Cluster analysis of 3D seismic data for oil and gas exploration

Cluster analysis of 3D seismic data for oil and gas exploration Data Mining VII: Data, Text and Web Mining and their Business Applications 63 Cluster analysis of 3D seismic data for oil and gas exploration D. R. S. Moraes, R. P. Espíndola, A. G. Evsukoff & N. F. F.

More information

KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting

KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting Never Stand Still Faculty of Engineering Computer Science and Engineering Weitao Xu 2,3, Guohao Lan 1,3, Qi

More information

Why? SenseML 2014 Keynote. Immanuel Schweizer

Why? SenseML 2014 Keynote. Immanuel Schweizer Why? SenseML 2014 Keynote Immanuel Schweizer Background Immanuel Schweizer TU Darmstadt, Germany Telecooperation Lab Ubiquitous Computing Smart Urban Networks SenseML 2014 2 Background Graph-based optimization

More information

Hybrid Models Using Unsupervised Clustering for Prediction of Customer Churn

Hybrid Models Using Unsupervised Clustering for Prediction of Customer Churn Hybrid Models Using Unsupervised Clustering for Prediction of Customer Churn Indranil Bose and Xi Chen Abstract In this paper, we use two-stage hybrid models consisting of unsupervised clustering techniques

More information

Measuring the Capability of Smartphones for Executing Context Algorithms

Measuring the Capability of Smartphones for Executing Context Algorithms Maximilian Eibl, Martin Gaedke. (Hrsg.): INFORMATIK 2017, Lecture Lecture Notes in Notes Informatics in Informatics (LNI), Gesellschaft (LNI), Gesellschaft für Informatik, für Informatik, Bonn 2017 Bonn

More information

Associative Cellular Learning Automata and its Applications

Associative Cellular Learning Automata and its Applications Associative Cellular Learning Automata and its Applications Meysam Ahangaran and Nasrin Taghizadeh and Hamid Beigy Department of Computer Engineering, Sharif University of Technology, Tehran, Iran ahangaran@iust.ac.ir,

More information

Location-Based Services & Route Planning

Location-Based Services & Route Planning Praktikum Mobile und Verteilte Systeme Location-Based Services & Route Planning Prof. Dr. Claudia Linnhoff-Popien André Ebert, Sebastian Feld http://www.mobile.ifi.lmu.de WS 2017/18 Praktikum Mobile und

More information

Personal Trusted Device in Personal Communications

Personal Trusted Device in Personal Communications Personal Trusted Device in Personal Communications Jari Porras, Pekka Jäppinen, Petri Hiirsalmi, Arto Hämäläinen, Sami Saalasti, Raine Koponen and Satu Keski-Jaskari Laboratory of Communications Engineering

More information

Adaptive Spatiotemporal Node Selection in Dynamic Networks

Adaptive Spatiotemporal Node Selection in Dynamic Networks Adaptive Spatiotemporal Node Selection in Dynamic Networks Pradip Hari, John B. P. McCabe, Jonathan Banafato, Marcus Henry, Ulrich Kremer, Dept. of Computer Science, Rutgers University Kevin Ko, Emmanouil

More information

Tizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify

Tizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify Tizen apps with 1 Context Awareness, powered by AI by Shashwat Pradhan, CEO Emberify Introduction Context refers to information that characterizes a situation, between: Apps People Surrounding environment

More information

Data mining with sparse grids

Data mining with sparse grids Data mining with sparse grids Jochen Garcke and Michael Griebel Institut für Angewandte Mathematik Universität Bonn Data mining with sparse grids p.1/40 Overview What is Data mining? Regularization networks

More information

Applying Supervised Learning

Applying Supervised Learning Applying Supervised Learning When to Consider Supervised Learning A supervised learning algorithm takes a known set of input data (the training set) and known responses to the data (output), and trains

More information

Table Of Contents: xix Foreword to Second Edition

Table Of Contents: xix Foreword to Second Edition Data Mining : Concepts and Techniques Table Of Contents: Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments xxxi About the Authors xxxv Chapter 1 Introduction 1 (38) 1.1 Why Data

More information

MOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)

MOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology) Code No: R41054 R10 Set No. 1 1 a) Explain functional architecture of GSM. [8] b) Write and explain novel applications of Mobile Computing. [7] 2 a) Explain in detail about IEEE 802.11 MAC Data frames.

More information

3D Hand Pose Estimation with Neural Networks

3D Hand Pose Estimation with Neural Networks 3D Hand Pose Estimation with Neural Networks Jose Antonio Serra 1, Jose Garcia-Rodriguez 1, Sergios Orts 1, Juan Manuel Garcia- Chamizo 1, Anastassia Angelopoulou 2, Alexandra Psarou 2, Markos Mentzelopoulos

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Data Mining by I. H. Witten and E. Frank 7 Engineering the input and output Attribute selection Scheme-independent, scheme-specific Attribute discretization Unsupervised, supervised, error-

More information

Big Data Methods. Chapter 5: Machine learning. Big Data Methods, Chapter 5, Slide 1

Big Data Methods. Chapter 5: Machine learning. Big Data Methods, Chapter 5, Slide 1 Big Data Methods Chapter 5: Machine learning Big Data Methods, Chapter 5, Slide 1 5.1 Introduction to machine learning What is machine learning? Concerned with the study and development of algorithms that

More information

CSIS. Pattern Recognition. Prof. Sung-Hyuk Cha Fall of School of Computer Science & Information Systems. Artificial Intelligence CSIS

CSIS. Pattern Recognition. Prof. Sung-Hyuk Cha Fall of School of Computer Science & Information Systems. Artificial Intelligence CSIS Pattern Recognition Prof. Sung-Hyuk Cha Fall of 2002 School of Computer Science & Information Systems Artificial Intelligence 1 Perception Lena & Computer vision 2 Machine Vision Pattern Recognition Applications

More information

Machine Learning Techniques for Data Mining

Machine Learning Techniques for Data Mining Machine Learning Techniques for Data Mining Eibe Frank University of Waikato New Zealand 10/25/2000 1 PART VII Moving on: Engineering the input and output 10/25/2000 2 Applying a learner is not all Already

More information

Autoorganised Structures for Extraction of Perceptual Primitives

Autoorganised Structures for Extraction of Perceptual Primitives Autoorganised Structures for Extraction of Perceptual Primitives M. Penas, M.G.Penedo Dept. Computer Science Univ. of A Coruña, SPAIN M.J.Carreira Dept. Electronics and Computer Science Univ. of Santiago

More information

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps Stability Assessment of Electric Power Systems using Growing Gas and Self-Organizing Maps Christian Rehtanz, Carsten Leder University of Dortmund, 44221 Dortmund, Germany Abstract. Liberalized competitive

More information

Data: a collection of numbers or facts that require further processing before they are meaningful

Data: a collection of numbers or facts that require further processing before they are meaningful Digital Image Classification Data vs. Information Data: a collection of numbers or facts that require further processing before they are meaningful Information: Derived knowledge from raw data. Something

More information

Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security.

Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security. Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security. Security of Pervasive Communication, SPC 06 T-Systems Enterprise Services GmbH Technologiezentrum ENPS

More information

Machine Learning Chapter 2. Input

Machine Learning Chapter 2. Input Machine Learning Chapter 2. Input 2 Input: Concepts, instances, attributes Terminology What s a concept? Classification, association, clustering, numeric prediction What s in an example? Relations, flat

More information

Lecture 6: Unsupervised Machine Learning Dagmar Gromann International Center For Computational Logic

Lecture 6: Unsupervised Machine Learning Dagmar Gromann International Center For Computational Logic SEMANTIC COMPUTING Lecture 6: Unsupervised Machine Learning Dagmar Gromann International Center For Computational Logic TU Dresden, 23 November 2018 Overview Unsupervised Machine Learning overview Association

More information

Data Mining Practical Machine Learning Tools and Techniques

Data Mining Practical Machine Learning Tools and Techniques Input: Concepts, instances, attributes Data ining Practical achine Learning Tools and Techniques Slides for Chapter 2 of Data ining by I. H. Witten and E. rank Terminology What s a concept z Classification,

More information

Pedestrian Detection with Radar and Computer Vision

Pedestrian Detection with Radar and Computer Vision Pedestrian Detection with Radar and Computer Vision camera radar sensor Stefan Milch, Marc Behrens, Darmstadt, September 25 25 / 26, 2001 Pedestrian accidents and protection systems Impact zone: 10% opposite

More information

The Role of a Context Service in a System that aims at integrating the Digital with the Real World

The Role of a Context Service in a System that aims at integrating the Digital with the Real World The Role of a Context Service in a System that aims at integrating the Digital with the Real World Dagstuhl Seminar Ubiquitous Computing, 09.09.2001 Fritz Hohl (hohl@sony.de) Telecommunication Research

More information

Image Processing, Analysis and Machine Vision

Image Processing, Analysis and Machine Vision Image Processing, Analysis and Machine Vision Milan Sonka PhD University of Iowa Iowa City, USA Vaclav Hlavac PhD Czech Technical University Prague, Czech Republic and Roger Boyle DPhil, MBCS, CEng University

More information

Image Mining: frameworks and techniques

Image Mining: frameworks and techniques Image Mining: frameworks and techniques Madhumathi.k 1, Dr.Antony Selvadoss Thanamani 2 M.Phil, Department of computer science, NGM College, Pollachi, Coimbatore, India 1 HOD Department of Computer Science,

More information

Machine Learning for the Quantified Self. Lecture 2 Basic of Sensory Data

Machine Learning for the Quantified Self. Lecture 2 Basic of Sensory Data Machine Learning for the Quantified Self Lecture 2 Basic of Sensory Data Dataset (1) During the course we will use a running example provided by CrowdSignals.io People share their mobile sensors data (smart

More information

Robot Learning. There are generally three types of robot learning: Learning from data. Learning by demonstration. Reinforcement learning

Robot Learning. There are generally three types of robot learning: Learning from data. Learning by demonstration. Reinforcement learning Robot Learning 1 General Pipeline 1. Data acquisition (e.g., from 3D sensors) 2. Feature extraction and representation construction 3. Robot learning: e.g., classification (recognition) or clustering (knowledge

More information

Providing Information Superiority to Small Tactical Units

Providing Information Superiority to Small Tactical Units Providing Information Superiority to Small Tactical Units Jeff Boleng, PhD Principal Member of the Technical Staff Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon

More information

Figure 1: Workflow of object-based classification

Figure 1: Workflow of object-based classification Technical Specifications Object Analyst Object Analyst is an add-on package for Geomatica that provides tools for segmentation, classification, and feature extraction. Object Analyst includes an all-in-one

More information

Activity Recognition Using Cell Phone Accelerometers

Activity Recognition Using Cell Phone Accelerometers Activity Recognition Using Cell Phone Accelerometers Jennifer Kwapisz, Gary Weiss, Samuel Moore Department of Computer & Info. Science Fordham University 1 We are Interested in WISDM WISDM: WIreless Sensor

More information

Context Awareness for Group Interaction Support

Context Awareness for Group Interaction Support Context Awareness for Group Interaction Support Alois Ferscha, Clemens Holzmann, Stefan Oppl Institut für Pervasive Computing, Johannes Kepler Universität Linz Altenbergerstraße 69, A-4040 Linz {ferscha,holzmann,oppl}@soft.uni-linz.ac.at

More information

Discovery of Agricultural Patterns Using Parallel Hybrid Clustering Paradigm

Discovery of Agricultural Patterns Using Parallel Hybrid Clustering Paradigm IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 10-15 www.iosrjen.org Discovery of Agricultural Patterns Using Parallel Hybrid Clustering Paradigm P.Arun, M.Phil, Dr.A.Senthilkumar

More information

Modeling Context-Aware Behavior by Interpreted ECA Rules

Modeling Context-Aware Behavior by Interpreted ECA Rules Modeling Context-Aware Behavior by Interpreted ECA Rules Wolfgang Beer 1, Volker Christian 1, Alois Ferscha 1, and Lars Mehrmann 2 1 Johannes Kepler University Linz, Department for Practical Informatics,

More information

TreeGNG - Hierarchical Topological Clustering

TreeGNG - Hierarchical Topological Clustering TreeGNG - Hierarchical Topological lustering K..J.Doherty,.G.dams, N.Davey Department of omputer Science, University of Hertfordshire, Hatfield, Hertfordshire, L10 9, United Kingdom {K..J.Doherty,.G.dams,

More information

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques 24 Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Ruxandra PETRE

More information

Observations and Measurements

Observations and Measurements Observations and Measurements issues and upgrades Simon Cox CSIRO Exploration & Mining http://www.em.csiro.au Goal of Observations and Measurements Information model for Sensor Web Enablement consistent

More information

CS 556: Computer Vision. Lecture 18

CS 556: Computer Vision. Lecture 18 CS 556: Computer Vision Lecture 18 Prof. Sinisa Todorovic sinisa@eecs.oregonstate.edu 1 Color 2 Perception of Color The sensation of color is caused by the brain Strongly affected by: Other nearby colors

More information

Data Mining. Practical Machine Learning Tools and Techniques. Slides for Chapter 3 of Data Mining by I. H. Witten, E. Frank and M. A.

Data Mining. Practical Machine Learning Tools and Techniques. Slides for Chapter 3 of Data Mining by I. H. Witten, E. Frank and M. A. Data Mining Practical Machine Learning Tools and Techniques Slides for Chapter 3 of Data Mining by I. H. Witten, E. Frank and M. A. Hall Input: Concepts, instances, attributes Terminology What s a concept?

More information

Nexus A Global, Active,

Nexus A Global, Active, Nexus A Global, Active, and 3D Augmented Reality Model Institute for Parallel and Distributed Systems Universität ität Stuttgarttt t Overview Nexus A Global, Active, and 3D Augmented Reality Model Introduction:

More information

Mining di Dati Web. Lezione 3 - Clustering and Classification

Mining di Dati Web. Lezione 3 - Clustering and Classification Mining di Dati Web Lezione 3 - Clustering and Classification Introduction Clustering and classification are both learning techniques They learn functions describing data Clustering is also known as Unsupervised

More information

Semi-Supervised Clustering with Partial Background Information

Semi-Supervised Clustering with Partial Background Information Semi-Supervised Clustering with Partial Background Information Jing Gao Pang-Ning Tan Haibin Cheng Abstract Incorporating background knowledge into unsupervised clustering algorithms has been the subject

More information

Introduction to Data Mining and Data Analytics

Introduction to Data Mining and Data Analytics 1/28/2016 MIST.7060 Data Analytics 1 Introduction to Data Mining and Data Analytics What Are Data Mining and Data Analytics? Data mining is the process of discovering hidden patterns in data, where Patterns

More information

Topics in AI (CPSC 532L): Multimodal Learning with Vision, Language and Sound. Lecture 12: Deep Reinforcement Learning

Topics in AI (CPSC 532L): Multimodal Learning with Vision, Language and Sound. Lecture 12: Deep Reinforcement Learning Topics in AI (CPSC 532L): Multimodal Learning with Vision, Language and Sound Lecture 12: Deep Reinforcement Learning Types of Learning Supervised training Learning from the teacher Training data includes

More information

Swarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013

Swarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013 Slide 1 John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013 Disclaimer: I m not talking about the run- of- the- mill Internet of Things When people talk about the IoT, they often seem to be talking

More information

Diver Telemetry Wireless Groundwater & Surface Water Data Transmission

Diver Telemetry Wireless Groundwater & Surface Water Data Transmission Telemetry Wireless Groundwater & Surface Water Data Transmission Maximize data quality Reduce operating costs Near real-time insight -NETZ CONTROL 3 YOUR DATA IN STEPS Introduction -NETZ is a complete

More information

Ad hoc and Sensor Networks Chapter 3: Network architecture

Ad hoc and Sensor Networks Chapter 3: Network architecture Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Having looked at the individual nodes in the previous chapter,

More information

Careers in Smart Technologies Jamie McCormick September 17 th, 18 th & 19 th

Careers in Smart Technologies Jamie McCormick September 17 th, 18 th & 19 th Careers in Smart Technologies Jamie McCormick September 17 th, 18 th & 19 th 2014 Who I am Worked in the Irish Games Industry for 14 years Began games career during 4 th year (1998-1999) running games

More information

A Review on Cluster Based Approach in Data Mining

A Review on Cluster Based Approach in Data Mining A Review on Cluster Based Approach in Data Mining M. Vijaya Maheswari PhD Research Scholar, Department of Computer Science Karpagam University Coimbatore, Tamilnadu,India Dr T. Christopher Assistant professor,

More information

Event: PASS SQL Saturday - DC 2018 Presenter: Jon Tupitza, CTO Architect

Event: PASS SQL Saturday - DC 2018 Presenter: Jon Tupitza, CTO Architect Event: PASS SQL Saturday - DC 2018 Presenter: Jon Tupitza, CTO Architect BEOP.CTO.TP4 Owner: OCTO Revision: 0001 Approved by: JAT Effective: 08/30/2018 Buchanan & Edwards Proprietary: Printed copies of

More information

An Analysis of the Usage of Mobile Phones for Personalized Interactions with Ubiquitous Public Displays

An Analysis of the Usage of Mobile Phones for Personalized Interactions with Ubiquitous Public Displays An Analysis of the Usage of Mobile Phones for Personalized Interactions with Ubiquitous Public Displays Enrico Rukzio, Albrecht Schmidt, Heinrich Hussmann Media Informatics Institute for Computer Science

More information